Security device data communication protocol defended by collaborative network

A technology of security equipment and collaborative network, applied in electrical components, transmission systems, etc., can solve the problems of responding to network threats, whether it can handle unpredictable, etc., to achieve the effect of flexible change and accurate content

Active Publication Date: 2019-08-27
HARBIN ENG UNIV
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The goal of these specifications is to share network intelligence, but it is far from enough to share network intelligence with major security vendors
In recent years, with the continuous update and faster spread of network threats, even if the existing defense system can quickly receive network threat intelligence, it is different from the analysis timeliness of different security devices. Response, can handle unpredictable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security device data communication protocol defended by collaborative network
  • Security device data communication protocol defended by collaborative network
  • Security device data communication protocol defended by collaborative network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] A security device data communication protocol for collaborative network defense, speeding up existing network defense by coordinating data communication between a network defense command creator and command receiver, characterized in that, after the network defense command creator receives the defense means, according to the This protocol creates a network defense command and sends it to the command receiver. After the command receiver successfully receives the command, it creates a command response to the received command according to this protocol and sends it back to the command creator; in this protocol, the command receiver is the security Devices, protocols define the language for creating cyber defense commands and responses, and support updating of content.

[0025] The protocol defines the language in which the cyber defense command creator creates the command, the command receiver receives the command, and supports the updating of the content.

[0026] Among t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security device data communication protocol for collaborative network defense, and belongs to the technical field of network defense. The communication protocol provided by the invention is used for coordinating data communication between a network defense command creator and a network defense command receiver; the communication protocol is characterized in that after thenetwork defense command creator receives the defense means, a network defense command is created according to the communication protocol, and sent to the network defense command receiver, a network defense command response aiming at the received network defense command is created according to the communication protocol after the network defense command receiver successfully receives the network defense command, and sent back to the network defense command creator; in this communication protocol, the network defense command receiver is a security device. The protocol deals with infinite network threats by keeping the updating of the protocol content, and has the advantages of flexible change, accurate content and no ambiguity.

Description

technical field [0001] The invention belongs to the technical field of network defense, and in particular relates to a data communication protocol of a security device for cooperative network defense. Background technique [0002] Today, cyber defense systems leverage cyber threat intelligence sharing to detect and contain vulnerabilities before attackers start exploiting them. Mature foreign threat intelligence standards include network observable expressions (CyboX), structured threat information expressions (StructuredThreatInformationeXpression, STIX) and trusted automated exchange of indicator information (TrustedAutomatedeXchangeofIndicatorInformation, TAXII), STIX specification can describe many aspects of threat intelligence characteristics, including threat factors, threat activity, security incidents, etc., TAXII is used to transmit threat intelligence. Users will be able to pass anonymous data to their security providers, and security providers will be able to qu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/1441
Inventor 李晋张莉玲蒋正乾刘泽远程建华
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products